• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Outline the Data Protection Act and give examples of breaches.

Extracts from this document...

Introduction

´╗┐MATTHEW ALLEN N5 Data Protection Act What is it? With the growth of information in technology, large databases are needed to hold the huge amounts of information. Global networks are used to share and distribute this information around the world in seconds. In order to control this and to protect people?s right to privacy, the Data Protection Act was introduced in 1984. The 8 basic principles: http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles Data should? 1. Not be transferred to countries that do not have suitable data protection laws - There are similar data protection rules in all European Union countries. It is therefore acceptable to transfer personal data to another EU country, as it will still be protected. However, this principle refers to the European Economic Area (EEA) - this includes Iceland, Norway and Liechtenstein. (http://www.soas.ac.uk/infocomp/dpa/policy/outside/). Others countries, such as the United States, have not got suitable data protection laws either so personal data should not be sent to these countries. ...read more.

Middle

1. Be processed within the rights of data subjects - There are other vital privacy rights, as well as the Data Protection Act. These include the right to confidentiality. These affect how personal information can be used by companies. 1. Be obtained for specified and lawful purposes - This adds that the company must have a specific reason for processing data. Also, the data can only be processed for that purpose and no other. 1. Be adequate, relevant and not excessive for the purpose - This means that companies should collect the right amount of information for the fulfil purpose - no more and no less. In order to check whether they are collecting too much data, they look at the data and consider which pieces of information are absolutely critical in order to enable them to do whatever it is they are trying to do. Whatever is left can't be critical, so it would be unnecessary and it therefore should be disposed of. ...read more.

Conclusion

The forces could be punished under the data protection act. G4S (the security firm) said all files had been deleted, but this will come as no reassurance as they may not be trustworthy. (http://www.bbc.co.uk/news/uk-england-22265315). A statement said the data sent went over what was required, breaching the data protection act’s principles. This is therefore a breach of the act and a criminal investigation will occur as a result – to see who is to blame before action is taken. 1. A GP's receptionist who accessed sensitive medical information about her ex-husband's new wife has admitted breaching data protection law. She was fined £750. The two medical documents she accessed were referred to as highly confidential. www.publicservice.co.uk/news_story.asp?id=22417. Everybody expects their doctors to be confidential but the information was accessed by someone else. The victim of this crime feels betrayed and vulnerable as someone she barely knows, knows private information about her. What has happened can’t be undone and the fine of £750 will only give a small amount of satisfaction – some will feel that the charge was rather lenient. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    This applies to all processing except where you can rely on an exemption. Some examples of the conditions for processing are: the individual has consented to the processing; or the processing is necessary for the performance of a contract to which the individual is a party; or it is necessary

  2. The Child Protection Act.

    Reform to the Child Protection Act For the Child Protection Act to work as well in reality as it does in theory, certain changes need to be made. Those 95% which said that there was not enough funding or enough officers to deal with the cases, 80% of them answered that more funding should be made to aid this problem.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Not only will this increase the risk of spreading the virus, it'll also tarnish his reputation to fall and spread these viruses. What Mr Ajaib can do to aid against this is to install anti-virus software. His MacAfee trial ran out after 60 days, but if Mr Ajaib purchases it,

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    This will mean that the people living in or outside the Leyton area will have a lack of communication because the organisation may have not updated a specific persons contact details. Nevertheless, an individual can sue the organisation that is unable to keep personal information up to date and accurate as this is clearly mentioned in this specific law.

  1. Data Protection Act

    In the Data Protection Act 1998 it was updated legislation and gave employees the right to see the personal files. Organisations are only allowed to keep relevant information on customers for the purpose for which it was collected and not longer than is necessary.

  2. Data Protection Act

    Also data kept by the school must not be kept longer than necessary. When I leave the school the data should be deleted of the computer as it will no longer be necessary for the school to keep it as I am not there anymore.

  1. Right of privacy under Hong Kong's current laws

    Exemptions under DPO By the virtue of s.61 of the DPO, journalists are also empowered to discover the truth and probably inform the public as they are allowed to be exempted from certain provisions of the DPO for collecting and using data which is involved in "news activity"13, given that

  2. You have to explain how you have looked after the equipment and ensured its ...

    Viruses are common when a large number of users are used; such as schools and work offices. I have protected my work against Viruses by using anti-virus software, which scans my users memory and disks to detect viruses.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work